2023
DOI: 10.1109/access.2023.3237393
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Study of Digital Image Steganographic Techniques

Abstract: Steganography surpasses other mechanisms of securing data from potential threats. The modern digital arena calls for robust information hiding techniques and, thus, it has always been a flash point for researchers and academicians. Nowadays, transmission is susceptible to numerous hacks while sharing secret information through typical correspondence channel. Accordingly, everybody needs the classification, respectability, and realness of his or her privileged information. Particularly, different techniques are… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 107 publications
0
0
0
Order By: Relevance
“…Rahman et al [5] reviewed the steganographic methods, including but not limited to the spatial and transform domain embedding methods. The various algorithms for extracting and embedding processes in steganographic systems were reviewed in the work.…”
Section: Related Workmentioning
confidence: 99%
“…Rahman et al [5] reviewed the steganographic methods, including but not limited to the spatial and transform domain embedding methods. The various algorithms for extracting and embedding processes in steganographic systems were reviewed in the work.…”
Section: Related Workmentioning
confidence: 99%
“…Also, there are different measurements which determine the performance efficiency of steganography techniques such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Structural Similarity Index Measure (SSIM) and Signal to Noise Ratio (SNR) [13,14]. Steganography technique is quite valuable and it can be applied in many domains such as communication and secret data storing, e-commerce, database systems, data alteration protection, and media [15]. As we mentioned previously that the steganography technique has different www.ijacsa.thesai.org categories for hiding information which are embedding the information in text, images, audios, videos, or protocol.…”
Section: Introductionmentioning
confidence: 99%